When: August 21 through August 23, 2018

General schedule:

August 21st: Half-day and full-day training workshops

August 22nd, 23rd: Keynote and plenary presentations

A more detailed schedule of events is available on the Final Program Agenda

Where: The Westin Alexandria, near NSF headquarters. Reservations can be made online by clicking here.

Who: Attendees will include cybersecurity practitioners, technical leaders, and risk owners from within the NSF Large Facilities and CI Community, as well as key stakeholders and thought leaders from the broader scientific and information security communities.

Opportunities to Share: The NSF cyberinfrastructure ecosystem presents an aggregate of complex cybersecurity needs (e.g., scientific data and instruments, unique computational and storage resources, complex collaborations) as compared to other organizations and sectors. This community has a unique opportunity to develop information security practices tailored to these needs, as well as break new ground on efficient, effective ways to protect information assets while supporting science. The Summit will bring together leaders in NSF cyberinfrastructure and cybersecurity to continue the process initiated in 2013, 2014, 2015, 2016, and 2017: Building a trusting, collaborative community, and seriously addressing that community's core cybersecurity challenges. 

The Summit seeks proposals for presentations, breakout and training sessions. It offers opportunities for student scholarships. 

If you are interested in presenting at the Summit, please respond to the 2018 Call for Proposals when released. The Summit organizers welcome proposals from all individuals and agencies. 

For more information, please contact us at: info@trustedci.

Slides

Training Slides

WISE Workshop

Industrial Control System Security - Existing Infrastructure and New Designs - Phil Salkie

Setting up a compliance program for CUI - Erik Deumens

Automated Assessment Tools – Theory & Practice - Bart Miller and Elisa Heymann

Developing Cybersecurity Programs for NSF Projects - Kay Avila, Bob Cowles, Craig Jackson

Compliance 101: HIPAA, FISMA, NIST 800-171 and GDPR - Susan Ramsey

Security Log Analysis Training - Mark Krenz

Plenary Slides

Welcome and NSF Address - Jim Marsteller and Amy Friedlander

Keynote - Von Welch

Involving Students in Cybersecurity for CI - Jeremy Straub

Security Best Practices for Academic Cloud Service Providers - Rion Dooley, Richard Knepper, Mike Lowe

Silent Librarian - Kim Milford, Brett Zupan

Incident Response Communications - Susan Ramsey, Ashwin Jacob Mathew, Dr. Daniel Massey

Password Adventures for a VO - Warren Anderson

A case study on implementing crowdsourced threat intel and active response - Charley Kneifel, Richard Biever

Evidence Based Cybersecurity - Grayson Harbour

Security and Assurance for Research Identities - Jim Basney, Laura Paglione, Steve Tuecke, Romain Wartel